Ticket Information

Independent tickets are for those individuals who are not working for/with a company, attending on their own dime etc...

Ended

$350.00

$9.74

NSTIC Day October 19th - LATE

Ended

$200.00

$5.99

YUKON Day October 20th - LATE

Ended

$200.00

$5.99

Late One Day Registration - Tuesday October 18th

Ended

$200.00

$5.99

BIG Ticket

If you would like to Sponsor, are unable to get budget allocated and can afford a higher ticket price this is a great option for attendees who would like to support the conference! You can buy this ticket and expense it.

Event Details

The agenda will be created live each day by attendees present at the opening of the day. Doors will open at 8:00 each day with espresso and light breakfast.

Tuesday Day 1 will begin at 9:00AM with introduction/orientation followed by Agenda Creation. There will be 5 working sessions

Wednesday Day 2 NSTIC Day will have agenda creation beginning at 9:00AM. There will be 5 working sessions and a demo hour after lunch.

Thursday Day 3YUKON Day Will begin at 8:45AM with a brief introduction followed by agenda setting. There will be 5 working sessions and we will end by 4pm.

The Internet Identity Workshop focuses on “user-centric identity” and trying to solve the technical challenge of how people can manage their own identity across the range of websites, services, companies and organizations that they belong to, purchase from and participate with. We also work on trying to address social and legal issues that arise with these new tools. This conference we are going to also focus some attention on business models that can make this ecology of web services thrive.

Today it goes beyond “just” identity to be inclusive of:

Open Standards that have been born and developed at IIW - OpenID, OAuth, Activity Streams, Portable Contacts, Salmon Protocol, SCIM, UMA, and more

Legal Innovation including, Information Sharing Agreements, Data Ownership Agreements for and the development of “trust” frameworks across the ecosystem.

NSTIC - the National Strategy for Trusted Identities in Cyberspace (it uses the term “user-centric identity” 4 times & “citizen-centric identity” once)

Cloud Identity and the intersection of enterprise ID and people (consumer) ID.

Special Day's at this IIW!

Wednesday is NSTIC Day: This simply means that if you are super keen on talking about NSTIC topics and technologies and you only have one day to attend then come Wednesday. NSTIC will be covered on all days of the conference and other things will be discussed this day too.

Thursday is Yukon Day: One of the longtime themes of IIW is how identity and personal data intersect. Many important discussions about Vendor Relationship Management (VRM) have also taken place at IIW. In recognition of how personal data and identity are intertwined, the third day of the IIW, will be designated "IIW + Yukon" and will stress the emerging personal data economy. The primary theme will be personal data control and leverage, where the individual controls and drives the use of their own data, and data about them held by other parties.

This isn't social. It's personal. This day you can expext open-space style discussions of personal data stores (PDS), PDS ecosystems, and VRM. One purpose of Yukon is to start to focus on business models and value propositions, so we will specifically be reaching out to angels and VC's who are intersted in personal data economy plays and inviting them to attend.

IIW is the place where everyone from a diverse range of projects doing the real work of making this vision happen gathers and works intensively for three days. It is the best place to meet and participate with all the key people and projects! As a community we have been exploring these kinds of questions:

How are social networking sites and social media tools applying user-centric identity?

What are the open standards to make it work? (identity and semantic)

What are technical implementations of those standards?

How do different standards and technical implementations interoperate?

What are the new social norms and legal constructs needed to make it work?

What tools are needed to make it usably secure for end-users?

What are the businesses cases / models that drive all this?

How does it work?

After the brief introduction on the first day there are no formal presentations, no keynotes, no panels. We make the schedule when we are face to face the first day of the conference. We do this in part because the field is moving so rapidly that we your organizing team are in no position to know what needs to be talked about. We do know great people who will be there and it is the attendees who have a passion to learn and contribute to the event that will make it.